Authentication Technologies for Cloud Computing, IoT and Big Data

Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-...

Celý popis

Uloženo v:
Podrobná bibliografie
Hlavní autoři: Alginahi, Yasser M, Nomani Kabir, Muhammad
Médium: E-kniha
Jazyk:angličtina
Vydáno: Stevenage The Institution of Engineering and Technology 2019
Institution of Engineering & Technology
Vydání:1
Témata:
ISBN:9781785615566, 1785615564
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Obsah:
  • Chapter 1: Introduction -- Chapter 2: Information security -- Chapter 3: Data authentication algorithms -- Chapter 4: Cryptographic algorithms -- Chapter 5: Digital watermarking algorithms for multimedia data -- Chapter 6: Biometric authentication -- Chapter 7: Lightweight block ciphers with applications in IoT -- Chapter 8: Identification schemes in the post-quantum area based on multivariate polynomials with applications in cloud and IoT -- Chapter 9: Authentication issues for cloud applications -- Chapter 10: The insider threat problem from a cloud computing perspective -- Chapter 11: Cryptographic engines for cloud based on FPGA -- Chapter 12: Data protection laws -- Chapter 13: Conclusion
  • 10.3.2 Mitigating insider threats emanating from the CSU and the CSP -- 10.3.3 Specific techniques towards containing cloud-related insider threats -- 10.3.4 Framework of techniques -- 10.4 Challenges and future directions -- 10.5 Conclusion -- References -- 11. Cryptographic engines for cloud based on FPGA - Ramasubramanian Natarajan and Manjith Baby Chellam -- 11.1 Introduction -- 11.1.1 Field-programmable gate array (FPGA) -- 11.1.2 Cryptographic algorithms for encryption and authentication -- 11.1.3 Need of hardware cryptographic engines for cloud servers -- 11.2 Advanced encryption standard -- 11.2.1 Hardware realization of AES on FPGA -- 11.2.2 Efficiency of the system -- 11.3 Data encryption standard (DES) hardware accelerator -- 11.3.1 DES -- 11.3.2 Hardware realization of DES -- 11.4 Secure hash algorithm (SHA-256) -- 11.4.1 Block decomposition -- 11.4.2 Round function -- 11.4.3 Efficiency of the system -- 11.5 MD5 -- 11.5.1 Processing of message block -- 11.5.2 Compression function -- 11.5.3 Efficiency of the system -- 11.6 Dynamic partial reconfiguration (DPR) -- 11.7 Security system with AES, DES, SHA, and MD5 using DPR -- 11.7.1 Partial reconfiguration controller (PRC) -- 11.8 Future direction -- References -- 12. Data protection laws - Hiba Alginahi, Yasser M. Alginahi and Muhammad Nomani Kabir -- 12.1 Introduction -- 12.2 Why data protection policies? -- 12.2.1 Principles of data protection laws -- 12.3 Data classification -- 12.3.1 Types of data classification -- 12.3.2 The data classification process -- 12.4 Global cyberlaws -- 12.4.1 Data protection and privacy legislation -- 12.4.2 Online consumer protection legislation -- 12.4.3 E-transactions legislation -- 12.4.4 Cybercrime legislation -- 12.5 DPLs and social media -- 12.6 The EU general data protection regulation -- 12.7 DPLs and cybersecurity challenges
  • 6.4 Biometric authentication systems -- 6.4.1 Biometric authentication system design -- 6.4.2 Performance of biometric systems -- 6.4.3 Attacks on biometric authentication systems -- 6.5 Biometric template protection techniques -- 6.5.1 Biometric cryptosystems -- 6.5.2 Cancellable Biometrics -- 6.6 Biometric-based remote user authentication -- 6.6.1 Biometric-based remote user authentication systems using smart cards -- 6.6.2 Biometric template protection-based remote user authentication systems using smart cards -- 6.7 Challenges and research in biometrics cloud -- 6.8 Conclusion -- References -- 7. Lightweight block ciphers with applications in IoT - Meltem Kurt Pehlivanog˘lu, Muharrem Tolga Sakallı, Sedat Akleylek and Nevcihan Duru -- 7.1 Block ciphers design primitives -- 7.1.1 Confusion and diffusion layers -- 7.2 Lightweight cryptography -- 7.2.1 Standardization for lightweight cryptography -- 7.2.2 Lightweight block ciphers for IoT -- 7.2.3 Software performance analysis of some of the lightweight block ciphers on ESP8266 Wi-Fi module for IoT implementations -- 7.3 Authentication problems and solutions for IoT devices -- 7.4 Conclusion -- Acknowledgment -- References -- 8. Identification schemes in the post-quantum area based on multivariate polynomials with applications in cloud and IoT - Sedat Akleylek and Meryem Soysaldı -- 8.1 Introduction -- 8.1.1 Motivation -- 8.1.2 Organization -- 8.2 Preliminaries -- 8.2.1 Basics of identification schemes -- 8.2.2 Multivariate polynomials system -- 8.3 Identification schemes in the post-quantum era -- 8.3.1 Sakumoto et al.'s identification schemes based on MQ polynomials -- 8.3.2 Sakumoto's identification schemes based on MC polynomials -- 8.3.3 Nachef et al.'s identification schemes -- 8.3.4 Monteiro et al.'s identification scheme -- 8.3.5 Soysaldi's identification scheme
  • Intro -- Contents -- Preface -- 1. Introduction - Muhammad Nomani Kabir and Yasser Alginahi -- 1.1 Basic terminologies and motivation -- 1.2 Overview of the book chapters -- References -- 2. Information security - Zubair Baig, Sherali Zeadally and Andrew Woodward -- 2.1 Introduction -- 2.2 Confidentiality -- 2.2.1 Symmetric key cryptography -- 2.2.2 Public key cryptography -- 2.3 Integrity -- 2.4 Availability -- 2.5 Authenticity -- 2.6 Non-repudiation -- 2.7 Standards -- 2.7.1 X.509 -- 2.7.2 Transport layer security -- 2.7.3 Hashes -- 2.7.4 Digital signatures -- 2.7.5 Public key infrastructure -- 2.7.6 Public key cryptography -- 2.7.7 OAuth -- 2.7.8 Kerberos (RFC 4120) -- 2.8 Threat classes -- 2.9 Data classification -- 2.10 Information security for the IoT -- 2.11 Health-care information security standards -- 2.12 National Institute of Standards and Technology (NIST)-framework for improving critical infrastructure cybersecurity -- 2.13 Challenges for information security in the IoT era -- 2.14 Conclusion -- References -- 3. Data authentication algorithms - Sarah Al-Shareeda -- 3.1 Taxonomy of authentication methodologies -- 3.2 Password-based authentication -- 3.3 Cryptographic-based authentication -- 3.3.1 Cryptographic hash functions -- 3.3.2 Symmetric key authentication -- 3.3.3 Asymmetric key authentication -- 3.4 Biometric authentication -- 3.5 Learned lessons and future trends -- 3.6 Conclusions -- References -- 4. Cryptographic algorithms - Bahram Rashidi -- 4.1 Introduction -- 4.2 Symmetric cryptography -- 4.2.1 Data encryption standard -- 4.2.2 Triple DES (3DES) -- 4.2.3 Advanced encryption standard -- 4.3 Asymmetric cryptography or PKC -- 4.3.1 Rivest, Shamir, and Adleman -- 4.3.2 ElGamal public-key encryption -- 4.3.3 Elliptic curve cryptosystems -- 4.3.4 Protocols -- 4.4 Digital signatures -- 4.4.1 RSA digital signature scheme
  • 4.4.2 ElGamal digital signature scheme -- 4.4.3 Schnorr digital signature scheme -- 4.4.4 Digital signature standard -- 4.4.5 Elliptic curves digital signature algorithm -- 4.5 Hash functions -- 4.5.1 Applications of cryptographic hash functions -- 4.5.2 Secure hash algorithm (SHA) -- 4.5.3 SHA-3 -- 4.6 Authenticated encryption -- 4.7 Authentication techniques and security of the IoT, big data, and cloud computing -- 4.7.1 Security of IoT -- 4.7.2 Security of Big Data -- 4.7.3 Security of cloud computing -- 4.8 Advantages and disadvantages of the cryptographic algorithms -- 4.9 Research challenges and future perspectives -- 4.10 Conclusion -- References -- 5. Digital watermarking algorithms for multimedia data - SK Hafizul Islam, Arup Kumar Pal, Shiv Prasad, Soumitra Roy, Raunak Rungta and Shikha Verma -- 5.1 Introduction -- 5.1.1 Chapter organization -- 5.2 Properties of digital watermarking -- 5.3 Applications of digital watermarking -- 5.3.1 Copyright protection -- 5.3.2 Transaction tracing fingerprinting -- 5.3.3 Broadcast monitoring -- 5.3.4 Tamper proofing -- 5.4 Classification of digital watermarking -- 5.5 Watermarking procedure -- 5.5.1 Robust watermarking -- 5.5.2 Fragile watermarking -- 5.5.3 Semi-fragile watermarking -- 5.6 Chapter summary -- 5.7 Future research directions -- References -- 6. Biometric authentication - Alawi A. Al-Saggaf and Mohammed Abdul Majid -- 6.1 Introduction -- 6.2 Fundamentals and types of errors -- 6.2.1 Identification, authentication and verification -- 6.2.2 Types of errors -- 6.3 Biometric authentication modalities -- 6.3.1 Fingerprint recognition -- 6.3.2 Iris recognition -- 6.3.3 Facial recognition -- 6.3.4 Voice recognition -- 6.3.5 Ear recognition -- 6.3.6 Hand geometry -- 6.3.7 Vein pattern recognition -- 6.3.8 Signature verification -- 6.3.9 Keystroke dynamics -- 6.3.10 Gesture biometrics
  • 8.3.6 Akleylek et al.'s identification scheme -- 8.3.7 Comparison of all identification schemes based on multivariate polynomials -- 8.4 Cloud and IoT applications of quantum secure identification scheme -- 8.5 Challenges and future directions -- 8.6 Conclusion -- Acknowledgment -- References -- 9. Authentication issues for cloud applications - Bahram Rashidi -- 9.1 Introduction -- 9.2 Security issues in cloud applications -- 9.2.1 Identity and access management (IAM) -- 9.2.2 Confidentiality and data encryption -- 9.2.3 Attacks against information in the cloud environments -- 9.2.4 Virtualization security in the cloud system -- 9.3 Authentication architectures and strategies in the cloud applications -- 9.3.1 UserId/Password authentication -- 9.3.2 Trusted platform module-based authentication -- 9.3.3 Public key infrastructure-based authentication -- 9.3.4 Multi-factor authentication -- 9.3.5 Implicit authentication -- 9.3.6 Internet-personal identification number (I-PIN) authentication -- 9.3.7 Context-aware cloud authentication -- 9.3.8 Cloud federation authentication -- 9.3.9 Extensible authentication protocol -- 9.3.10 Biometric authentication -- 9.3.11 Single sign-on (SSO) -- 9.4 Advantages and disadvantages of authentication methods -- 9.5 Research challenges and future perspectives -- 9.6 Conclusion -- References -- 10. The insider threat problem from a cloud computing perspective - Keshnee Padayachee -- 10.1 Introduction -- 10.2 Challenges to insider threat mitigation in the cloud -- 10.2.1 Defining the insider threat -- 10.2.2 Background of insider threat mitigation -- 10.2.3 Machinations of cloud-based security -- 10.2.4 Security concerns in the cloud -- 10.2.5 Moderating the insider threat in cloud-based systems -- 10.3 Cloud-based insider threat mitigation strategies -- 10.3.1 Mitigating insider threats emanating from the CSP
  • 12.8 Data privacy and cybersecurity checklist